EvilZone
Hacking and Security => Hacking and Security => : M1lak0 July 30, 2015, 02:07:04 PM
-
A very new generation anonymization theory out by researchers.
It can process high-speed anonymous traffic upto 93 gb/s.
You can check out briefly about it:
http://arstechnica.com/information-technology/2015/07/researchers-claim-theyve-developed-a-better-faster-tor/ (http://arstechnica.com/information-technology/2015/07/researchers-claim-theyve-developed-a-better-faster-tor/)
and the Official paper:
http://arxiv.org/pdf/1507.05724v1.pdf (http://arxiv.org/pdf/1507.05724v1.pdf)
-
I read about this. Very interesting. Tor has obviously been cracked open by the NSA so this could be a disaster waiting to happen. Still most definitely very interesting to say the least.
-
I read about this. Very interesting. Tor has obviously been cracked open by the NSA so this could be a disaster waiting to happen. Still most definitely very interesting to say the least.
(http://s2.quickmeme.com/img/f1/f1f52abb3713c10277cb5068aa5d9a0dfb7f9c6d158d8fd930fce323891d9693.jpg)
HORNET, like Tor, is not immune to targeted attacks on anonymity. If an attacker, such as a government agency or law enforcement organization, could control more than one of the nodes along a path selected for a HORNET channel, they would be able to perform "confirmation attacks"—the sort of timing analysis, flow analysis, and packet tagging that other security researchers have demonstrated could be used against Tor. "HORNET cannot prevent such confirmation attacks targeting individual users," the researchers concluded. "However, HORNET raises the bar of deploying such attacks for secretive mass surveillance: the adversary must be capable of controlling a significant percentage of ISPs often residing in multiple geopolitical boundaries, not to mention keeping such massive activity confidential."
-
No need to flame there buddy. Posting the paragraph would have been enough. ::)
-
(https://cdn-images.xda-developers.com/direct/1/3/0/5/2/8/7/uploadfromtaptalk1346892713051.jpg)
-
No need to flame there buddy. Posting the paragraph would have been enough. ::)
However if you had read the article, you would've read that before opening your ignorant mouth.
The only benefit of HORNET over TOR is the speed with the same level of anonymity. The same methods used by the government to track down the owner of the silk road based off of time matching and controlling of exit nodes is what makes it vulnerable. You can be as secure as you want but the person or government in control of your exit node is what's going to trace back to you. Unfortunately with the onion routing protocol this can never be fixed as it's the way the service works.
And btw I'm not your buddy, guy.